Results 1 to 11 of 11

Thread: So........these draytek firewalls then.

  1. #1
    Senior Member
    Join Date
    Mar 2005
    Posts
    4,935
    Thanks
    171
    Thanked
    384 times in 311 posts
    • badass's system
      • Motherboard:
      • ASUS P8Z77-m pro
      • CPU:
      • Core i5 3570K
      • Memory:
      • 32GB
      • Storage:
      • 1TB Samsung 850 EVO, 2TB WD Green
      • Graphics card(s):
      • Radeon RX 580
      • PSU:
      • Corsair HX520W
      • Case:
      • Silverstone SG02-F
      • Operating System:
      • Windows 10 X64
      • Monitor(s):
      • Del U2311, LG226WTQ
      • Internet:
      • 80/20 FTTC

    So........these draytek firewalls then.

    Supposedly stateful.

    I create a rule like allow all traffic from the lan on a port over 1024 TCP to somewhere on the internet on port 80 TCP
    I create another rule to allow anything on the internet originating from port 80 going to anything above port 1024 on a host in the LAN. I click the keep state checkbox so in theory only traffic related to outgonig traffic is allowed in (in this case website related traffic)
    Does this not seem a little...haphazard? How do I ensure that rule 2 only allows traffic related to rule 1?

    How about creating rule 1 and instead of the stupid keep state checkbox they have allow related traffic in the opposite direction?
    Am I missing something here?
    "In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."

  2. #2
    Senior Member
    Join Date
    Mar 2005
    Posts
    4,935
    Thanks
    171
    Thanked
    384 times in 311 posts
    • badass's system
      • Motherboard:
      • ASUS P8Z77-m pro
      • CPU:
      • Core i5 3570K
      • Memory:
      • 32GB
      • Storage:
      • 1TB Samsung 850 EVO, 2TB WD Green
      • Graphics card(s):
      • Radeon RX 580
      • PSU:
      • Corsair HX520W
      • Case:
      • Silverstone SG02-F
      • Operating System:
      • Windows 10 X64
      • Monitor(s):
      • Del U2311, LG226WTQ
      • Internet:
      • 80/20 FTTC
    Quote Originally Posted by badass View Post
    Supposedly stateful.

    I create a rule like allow all traffic from the lan on a port over 1024 TCP to somewhere on the internet on port 80 TCP
    I create another rule to allow anything on the internet originating from port 80 going to anything above port 1024 on a host in the LAN. I click the keep state checkbox so in theory only traffic related to outgonig traffic is allowed in (in this case website related traffic)
    Does this not seem a little...haphazard? How do I ensure that rule 2 only allows traffic related to rule 1?

    How about creating rule 1 and instead of the stupid keep state checkbox they have allow related traffic in the opposite direction?
    Am I missing something here?
    Can someone confirm I have things right or if I have the wrong idea?
    "In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."

  3. #3
    Senior Member
    Join Date
    Aug 2005
    Location
    Brisbane
    Posts
    612
    Thanks
    20
    Thanked
    35 times in 22 posts
    • toolsong's system
      • Motherboard:
      • ASUS P7P55D EVO
      • CPU:
      • i7 860 @ 3.8 GHz
      • Memory:
      • 2 x 4GB Corsair Vengeance
      • Storage:
      • SSDs
      • Graphics card(s):
      • GTX970
      • PSU:
      • Seasonic X650
      • Case:
      • Antec P180
      • Operating System:
      • Win7 x64
      • Monitor(s):
      • Dell U2515H
      • Internet:
      • Fibre @ 100/40
    Dude you need to be over here
    http://www.forum.draytek.co.uk/

  4. #4
    Administrator Moby-Dick's Avatar
    Join Date
    Jul 2003
    Location
    There's no place like ::1 (IPv6 version)
    Posts
    10,665
    Thanks
    53
    Thanked
    385 times in 314 posts
    Firewall rules are always processed in order (usually with a default action after processing the rule ) if it helps

    also make sure you know which way the firewall sees as IN and OUT
    my Virtualisation Blog http://jfvi.co.uk Virtualisation Podcast http://vsoup.net

  5. #5
    Registered+
    Join Date
    Oct 2006
    Posts
    33
    Thanks
    0
    Thanked
    0 times in 0 posts
    you can always call them up as in the past i have dealt with their support and they are always very knowledgeable

  6. #6
    Senior Member
    Join Date
    Mar 2005
    Posts
    4,935
    Thanks
    171
    Thanked
    384 times in 311 posts
    • badass's system
      • Motherboard:
      • ASUS P8Z77-m pro
      • CPU:
      • Core i5 3570K
      • Memory:
      • 32GB
      • Storage:
      • 1TB Samsung 850 EVO, 2TB WD Green
      • Graphics card(s):
      • Radeon RX 580
      • PSU:
      • Corsair HX520W
      • Case:
      • Silverstone SG02-F
      • Operating System:
      • Windows 10 X64
      • Monitor(s):
      • Del U2311, LG226WTQ
      • Internet:
      • 80/20 FTTC
    I've sent an email to their tech support. I'm pretty sure thats what they told me over the phone the last time I talked to them.
    Moby - I've confirmed the IN and OUT thing ages ago and i do use a "default block all" rule at the end of my rules.

    The problem I have had is I got fed up with setting up the security properly (i.e. block everything apart from what I explicitly allow in AND out) sinece no game made these days is designed with that in mind. Like BF2 for instance. You simply cant create firewall rules to allow it to work since it allows the server to specify the port
    and before anyone points me to various webpags with port lists, yes I have seen them, but none of them mention this server specifying port feature.

    So I gave up on proper security and went for convenience and decided to set an allow all outgoing rule and the corresponding allow all incoming related rule.
    I then tested it and BF2, WoW etc worked fine. I then got a probe done on it from an external source - it passed.

    several daya later I find its been allowing all traffic in, whether related or not!
    My unsecured FTP server (that was as it was behind a hardware firewall) has 3 gigs of cr@p I didn't put on it and one of the PC's that was behind it has a virus of some sort since I've just had an abuse report.
    Fortunately its not any of the important machines since they all have the windows firewall enabled through group policy and dont allow much in thats not from the local subnet.
    Still got to find this rogue machine though.
    "In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."

  7. #7
    Administrator Moby-Dick's Avatar
    Join Date
    Jul 2003
    Location
    There's no place like ::1 (IPv6 version)
    Posts
    10,665
    Thanks
    53
    Thanked
    385 times in 314 posts
    tricky one - I've never had hideous ammounts of luck with the draytek firewall , though I'm sure its just a checkbox I'm missing somewhere.

    why not do belt and praces and set up a vmware box with a ipchains f/w

    you can download preconfigured vm's from their website which might do it
    my Virtualisation Blog http://jfvi.co.uk Virtualisation Podcast http://vsoup.net

  8. #8
    Senior Member
    Join Date
    Mar 2005
    Posts
    4,935
    Thanks
    171
    Thanked
    384 times in 311 posts
    • badass's system
      • Motherboard:
      • ASUS P8Z77-m pro
      • CPU:
      • Core i5 3570K
      • Memory:
      • 32GB
      • Storage:
      • 1TB Samsung 850 EVO, 2TB WD Green
      • Graphics card(s):
      • Radeon RX 580
      • PSU:
      • Corsair HX520W
      • Case:
      • Silverstone SG02-F
      • Operating System:
      • Windows 10 X64
      • Monitor(s):
      • Del U2311, LG226WTQ
      • Internet:
      • 80/20 FTTC
    Quote Originally Posted by Moby-Dick View Post
    tricky one - I've never had hideous ammounts of luck with the draytek firewall , though I'm sure its just a checkbox I'm missing somewhere.

    why not do belt and praces and set up a vmware box with a ipchains f/w

    you can download preconfigured vm's from their website which might do it
    In an Ideal world I would probably do that, but the machines that are left on 24/7 dont have enough spare memory to run a VM and the machine with 4 CPU's and 4 GB's isn't left on 24/7 as it uses so much power, all of the lights in the street dim when its switched on :wack:

    However after some email correspondance with a draytek support engineer, I have confirmed I was right in how I setup the rules. They just didn't work as they should have.
    "In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."

  9. #9
    Administrator Moby-Dick's Avatar
    Join Date
    Jul 2003
    Location
    There's no place like ::1 (IPv6 version)
    Posts
    10,665
    Thanks
    53
    Thanked
    385 times in 314 posts
    a cut down linux firewall VM isn't gon to take much power tbh.

    think of somethign smoothwall / m0n0wal based and hos lightweight those distros are
    my Virtualisation Blog http://jfvi.co.uk Virtualisation Podcast http://vsoup.net

  10. #10
    Senior Member
    Join Date
    Mar 2005
    Posts
    4,935
    Thanks
    171
    Thanked
    384 times in 311 posts
    • badass's system
      • Motherboard:
      • ASUS P8Z77-m pro
      • CPU:
      • Core i5 3570K
      • Memory:
      • 32GB
      • Storage:
      • 1TB Samsung 850 EVO, 2TB WD Green
      • Graphics card(s):
      • Radeon RX 580
      • PSU:
      • Corsair HX520W
      • Case:
      • Silverstone SG02-F
      • Operating System:
      • Windows 10 X64
      • Monitor(s):
      • Del U2311, LG226WTQ
      • Internet:
      • 80/20 FTTC
    Quote Originally Posted by Moby-Dick View Post
    a cut down linux firewall VM isn't gon to take much power tbh.

    think of somethign smoothwall / m0n0wal based and hos lightweight those distros are
    Its more the installation of VMware TBH.
    Also, connecting a computer thats used as anything more than a firewall directly to the internet scares me. I like the reassurance that all traffic has to pass through a firewall before it can get to any machines. Yes I know - fat lot of god thats done me so far
    "In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."

  11. #11
    Member
    Join Date
    Jul 2004
    Location
    Crewe
    Posts
    88
    Thanks
    0
    Thanked
    0 times in 0 posts
    If its truly a stateful firewall then you shouldn't need to add a rule for traffic back. The firewall should create a new connection in its state table for the outgoing traffic and then statefully allow the traffic that is part of that session back into the network. That worked on the old draytek 2600 routers but it didn't seem to have a big enough connection table as bittorant would kill other connections off.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Draytek Vigor 2800G mini-review
    By Taz in forum Networking and Broadband
    Replies: 13
    Last Post: 05-09-2020, 08:28 PM
  2. Draytek 2800G Dropping Connection
    By jon bda in forum Networking and Broadband
    Replies: 9
    Last Post: 24-07-2006, 03:14 PM
  3. Draytek Vigor 2800G - new firmware 2.6.3.1 released
    By Taz in forum Networking and Broadband
    Replies: 8
    Last Post: 05-06-2006, 02:46 PM
  4. Firewalls acting as spies
    By Steve in forum HEXUS News
    Replies: 10
    Last Post: 23-01-2006, 06:11 PM
  5. Firewalls.
    By Dave_07 in forum Software
    Replies: 11
    Last Post: 23-04-2004, 01:23 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •